All Posts By

Savannah

Guest Post: How to earn crypto by sharing your bandwidth via AVADO

This is a guest post by our partners over at Avado


Two months ago I started to run a package on my AVADO Blockchain Computer called Mysterium Network. This package installs a VPN endpoint on my computer which allows me to share my bandwidth with other users. For sharing the bandwidth, I receive a  monthly payment of up to 50 USD in Ether (you can find the exact payment rules here).

But first, let’s take this step by step.

 

What is AVADO?

AVADO is a blockchain computer that provides access to Web3 applications. Web3 is the internet of value, also known as the blockchain economy. It’s powered by many decentralized applications (DApps).

Think of AVADO like your modem which you need to interact with the blockchain. You don’t have to have any knowledge of the blockchain itself, you can choose applications that are built on the blockchain from the integrated DAppStore. Check out the website https://ava.do for more info.

Mysterium is one of these Web3 DApps 

Mysterium Network has created a VPN for private internet access, and it’s all peer to peer. By selecting the Mysterium package from the AVADO DAppstore, you can rent out your bandwidth and earn up to 50 USD worth of Ether every month.

Why use a VPN? Because information should be available to anyone; firewalls, geo-blocks and censorship erode democracy and freedom of expression. 

 

“You can help the internet to be great again,

deserving of  its name – World Wide Web.”

 

By transforming your AVADO Box into a secure VPN connection, people in censored countries can buy VPN services from Mysterium Network. They gain access to information which their governments want to block from their view, like information on the Coronavirus.

You can help the internet to be great again, deserving of its name – World Wide Web. All you need is a stable connection and Mysterium’s easy to use DApp, so you can be in sleep mode while your AVADO earns crypto for you.

How does the Mysterium Network VPN work?

Mysterium Network has two modes: accept all traffic, or send only whitelisted traffic. Their decentralized architecture distributes traffic across the network using an advanced sharding technique. It scrambles and encrypts all data so that no single node ever has the full picture of what the user is doing. Mysterium Network’s layered protection protocols are designed to preserve your privacy – both as a user and a node.

Your AVADO Blockchain Computer becomes one of the endpoints for people using the Mysterium Network.

If you want to earn crypto with the AVADO Box, what do you need to do?

First of all, you need an AVADO Box. We ensured that the Mysterium Network package runs without friction on this hardware.

You can find the Mysterium Package in your AvadOS DAppstore.

Over time, other DApps that rent out your disk space or processing power will be added to the DAppstore. 

What are my crypto earnings like?

As stated above, my Mysterium package has been running for two months now. In February I already earned 40 USD worth of Ether from participating in their Node Pilot, a research and development initiative they have been running to understand network dynamics as they gear up for mainnet. This month is halfway through and I am the second-highest on the leaderboard for my country.

What’s even more interesting is seeing which countries are using my endpoint. In my list, I see people from Russia, China, Iran, Nigeria, Turkey, Uganda, Vietnam, and many more countries. This gives me a good feeling that besides earning money, I am helping people to access information their government wants to restrict. I hope more people from these countries will use Mysterium and overcome censorship.

 

I hope to see you on the leaderboard soon as well and help free the web.

 

Written by Bernd Lapp: I am a former Advisory Board Member of the Ethereum Foundation, Founder of AVADO, Country Manager for CasperLabs and Advisor to a few Blockchain based Projects.
I like to simplify things. Nothing written in my blog posts is scientifically researched and only reflects my personal point of view. I use naive logic and have come quite far doing so.
If you like my posts, please feel free to follow me here or on Twitter or LinkedIn.


Learn more about our partnership with Avado.

Top 5 online hackathons; cure your quarantine boredom with bounties

Virtual is the new black.

As more and more of the world makes a pact to #StayTheFHome this COVID19 season, all planned conferences, meetups and hackathons are adapting their events for the online domain. 

So switch off Netflix and polish up your webcam – there’s hacking to be done, things to learn and bounties to win.

Funding the Future Virtual Hackathon

Organised by: Gitcoin 

Dates: March 16 – 30th

Prize: Up to $6500 per challenge

Gitcoin is a platform for you to get paid for working on open source projects. They’ve built a strong community of developers who collaborate and monetize their skills. 

They frequently host online hackathons and bounty programs, so you can check out the full list of current and upcoming virtual events, including their Funding the Future Hackathon. 

This two-week virtual hackathon features sponsors and projects from across the emerging decentralized finance (DeFi) space. Hackers will work together to build projects and tools that create, grow, and share value in brand new ways.

They’re also running a Blockchain for Social Impact hackathon, with 4 different categories: Sustainable Cities, Plastics and Pollution, Carbon Footprint, and Celp Peace and Prosperity. Winning ideas receive $6,500 in prize value (and runner up gets $1,500). Not a bad sum for trying to fix the planet. 

Can’t Be Censored Challenge

 

Organised by: Mysterium.Network

Dates: Applications close April 14th

Prize: Up to $5000 (first prize)

Calling all devs who give a sh*t about keeping the internet accessible and free. 

Mysterium Network is a distributed, permissionless privacy network. We’ve grown a large residential IP network for all kinds of next-gen privacy applications to be built on top of. 

Enter our “Can’t be Censored” challenge by submitting an app/DApp that fits into one of the featured categories and ultimately helps global citizens access the internet, no matter where in the world they are.  

We’re looking for new application ideas that span across iOS, Browser Plugin, Android TV, Bitcoin’s Lightning Network, Windows – or anything you like that you can build on our Network. 

Use code (and your brains) to put an end to internet censorship, data breaches and the abuse of our privacy rights.

International Women's Hackathon 2020

 

Organised by: HackerEarth

Dates: March 8th – April 30th

Prize: Up tp $3000

The annual International Women’s Hackathon has returned for 2020! This is its 6th edition, an all-women event and platform to showcase talents and build ideas for the Financial Technology, Augmented Reality, Virtual Reality, and Blockchain industries.

The IWH 2020 supports the UN’s theme for International Women’s Day – “Think equal, build smart, innovate for change,” and promote women developers around the globe. 

It invites women innovators, developers, creators, designers, and hackathon enthusiasts to showcase their projects to the world and take them to the next level.

GitLab Hackathon

 

Organised by: GitLab

Dates: May 13th – 14th

Prize: $100 to spend at the GitLab store

If you’re a dev, then you definitely have a GitHub or GitLab account. Easily join the GitLab community for this 2 day virtual event.

The Hackathon is open to anyone who is interested in contributing code, documentation, translations, UX designs and more to GitLab. Prizes are given to participants for having Merge Requests (MRs) merged and there may also be special award categories at each Hackathon.

You can choose an existing issue to work on, or file a new one. If it’s your first time contributing, a good way to join the Hackathon is to pick and fix a bite size issue. There are also issues for more experienced contributors.

Hack Quarantine

Organised by: Hackathons UK

Dates: March 23rd to April 12th

Prize: Cure the world and get to go outside again… (i.e Non-monetary)

Fight the flu! With your brain?

This fully-online, people-focused hackathon brings people together to use their skills to help combat the issues the world is facing with the COVID-19 pandemic. Work with medical professionals who will provide the knowledge and tools to empower all hackers to work on improving health, remote working and helping vulnerable populations.

Instead of having different challenges, the hackathon has separate “tracks”. Your project doesn’t have to fit perfectly into one track, it could be a mix and match of several (or all of them). Tracks were chosen based on areas where tech could be used to help solve some of the problems that the world is currently facing with the ongoing pandemic.

And for Data Scientists with a little more time on their hands…

Microsoft’s AI for Earth awards grants to support projects that use AI to change the way people and organizations monitor, model, and manage Earth’s natural systems. They’ve  already awarded 508 grants to projects with impact in 81 countries, and the list of grantees continues to grow. The four categories cover climate, agriculture, biodiversity and water.

Microsoft also offers awards to support environmental technology projects. They work with partner organizations to distribute special grants, including cash awards. You can check out these opportunities and learn how to apply. 

 

Get hack-proof in 5 minutes! Best cybersecurity tips and tricks for a new digital decade

best cybersecurity tips

In a time when cyberattacks have reached an all-time high, it’s best we all clean up our act and give ourselves a good cyberscrub. 

Good web hygiene leave no trace for advertisers or businesses to target you. But more importantly, they make it troublesome for hackers to find you.

Most hackers are lazy. They want minimal work for maximum return. If you’re an easy target, they’ll find out very quickly. If it will take even just a little effort to target you, they’ll move on to someone else. 

Don’t let yourself become a statistic in 2020. Put aside 5 minutes every day to tick each of these simple things off the list… 

The most important cybersecurity hack - secure passwords

Passwords are the first line of defence in cybersecurity, yet are often the weakest. In fact, approximately 80 percent of all data breaches are due to weak or reused passwords.

If you use the same password across multiple accounts, that’s bad. If you use the SAME password for EVERY account – that’s just asking for it. It’s likely your email/password combination has been stored in a database that’s been hacked.

You can check here if you’ve been “pwned” (have an account that has been compromised in a data breach). You bet some hacker out there will try to use the same combination to gain access to your email or online banking. They can steal your money or even your identity – identity theft is on the rise.

Do a password audit. If you have Gmail for example, this can be done by going into your account settings and doing a general security check. Make sure each password is different for every account. 

Find out if your passwords have been compromised and if so, immediately change all of them. 

Google chrome can suggest new strong passwords. You can also set up an account with 1Password, which can generate and store all of your different passwords. A lot of people ask are password managers safe?

If you can’t remember or understand your password, that’s best. Memorable or human-readable passwords are weak. 

Create different emails for different purposes

It’s easy to create new, separate email addresses which can be used for specific reasons. You can have a private email account that is used for things such as banking, tax, government services and medical accounts. 

Use a different email to deal with work, clients and customers – it’s a great way to separate your personal data from your professional life. 

Have an everyday account for things like online shopping, subscription services. That way, if this kind of database is hacked (more likely than your banking or government accounts), your email won’t be traced back to those important accounts. 

Wipe cookies, clear cache, and always go incognito

Cookies are the little crumb trails that websites leave behind in your browser or device. They are user-specific, so it helps the website remember you and keep track of your activity, such as saving your login details for next time. Cookies can be harmless – but some are rotten. 

There are third party tracking cookies which can track your physical movements and see your browsing history. In one extreme case in 2016, Verizon was fined by the FCC over a “supercookie” technology which allowed third-party advertisers and websites to “assemble a deep, permanent profile of visitors’ web browsing habits without their consent.”

Safari, Firefox and Chrome are all taking measures to phase out the use of tracking cookies, with the latter starting a privacy-first initiative to make these third-party cookies “obsolete” by 2022

Due to GDPR, you would have noticed that most websites now ask you to accept their cookie settings.

what are cookies computer

Try always to choose only the necessary or required amount – this will be the least invasive. And most importantly – go “incognito” whenever you can. This will stop those pesky cookies.

If you’re using Chrome, you can easily check the cookies stored by each browser. Click on the lock symbol in your URL bar and select “Cookies”. You can then block or remove cookies you want. 

Note that this may affect your typical browsing experience. 

You can update or delete your cookies by going into your browser settings:

Offline cold storage - store important files on an external hard drive or USB

Try to store all of your important documents offline, such as scans of your passport, bank statements, contracts and other sensitive information you wouldn’t want to fall into the wrong hands. Every so often, sift through your downloads and move your important things into your hard drive, then delete them off your computer. 

best cybersecurity tips

Turn on 2FA!

Turn on Two-Factor authentication to create one extra security layer – and possibly the most annoying barrier to accessing your devices. If an app or website gives you the option to enable 2FA, always do it! Text message, biometrics, or authenticator code – it costs you nothing except a few extra seconds and is probably the one hurdle a hacker won’t be bothered to jump over.

Don’t save card details online

This one is a given. When a website asks if you’d like to save your card details for the sake of convenience – just don’t. 

Some web browsers, like Google Chrome, will auto-fill your details. You can stop that here.

Turn off location services

This one’s easy. Go into your app settings and disable location services for every app that does not require it to function. Some apps, though need your location to work correctly like Uber or Maps, can often have the setting “only track location while using app” – switch to this if possible. 

iPhone users follow this guide. 

Android users, here’s all you need to know.

best free vpn

Don’t use public wifi - unless you’re using a VPN

Last but not least – if you’re working from a cafe, browsing online at the airport or just connecting to some shady public wifi that pops up – try to avoid using it all. 

If you MUST, avoid doing anything particularly private, like logging into your bank account. 

If you connect to public wifi regularly, then use a good VPN (like Mysterium’s free VPN for Android) every time you need to connect to public wifi. 

Learn more about our free VPN. It was the world’s first decentralized VPN, too.

Time to clean up your act!

Get hack-proof best cybersecurity tips

Get hack-proof best cybersecurity tips

Ecoin and the rise of corporate cryptocurrency: Did Mr Robot get it right?

Is Mr Robot a glimpse into our tech-onomic future?

The internet’s favourite fictional Robin Hood (Elliot Alderson) has finally hung up his hoodie, forcing us to return to our own parallel reality. 

For those who have not yet plugged into Mr Robot (using a dVPN?), the series follows hacktivist group “fsociety” who are on a mission to take down conglomerate E Corp and consequently erase the world’s debt. 

The narrative picks apart some of society’s deepest flaws – including the growing divide between the top 1% and 99% at the hands of modern capitalism – with philosophical intensity.

It tells us the world’s financial and corporate structures as made of glass. The hammer that can shatter them to pieces is made of code, clever social engineering and anarchism. 

And with most systems already migrated to the digital realm, just one man and his keyboard can bring a global powerhouse to its knees. 

Back in the real world, hackers launched a ransomware attack against Travelex, the foreign currency company. The hack has crippled their worldwide systems, forcing their stores, airport counters and exchange services offline and leaving customers stranded.

Life imitating art? 

Mr Robot predicts a haunting future for our tech-dependant society based on these very real events; the modern-day revolution is digital, technology is the weapon, and everyday people are still the casualties. 

Cash is dead

The world economy falls apart following fsociety’s 5/9 hack against E Corp’s global banking network. The CEO swiftly launches a new digital currency for its clients and millions of customers, a substitute for fiat cash.

There are blunt negotiations with the US Treasury Secretary, who is asked to endorse Ecoin as a government-sanctioned currency before the population turns to the alternative – Bitcoin. 

“The problem here is hard cash is fading, rapidly. That’s just the way of the world right now and Bitcoin is spreading, and if Bitcoin takes over we are all in a world of hell…

With “Ecoin” we control the ledger, and the mining servers, We are the Authority. I will make sure you have visibility into every single wallet that is open, every loan, every transaction. You want to regulate it, be my guest… I’ll give you backdoors, side doors, tracers, whatever you want.”

Is this propagandist, American corporate dream already filtering into our financial system? 

The battle against Bitcoin

For anyone familiar with the origins of Bitcoin, they’ll understand that Ecoin is a violation of everything it stands for. 

As the original and most popularised cryptocurrency, Bitcoin is a virtual currency that is issued, managed and used by everyday people. 

Emerging out of the wreckage of the global 2008 financial crisis, it promised a new monetary system that could help people stay afloat as our economies are sunk by corporate greed and government corruption. 

Termed as “the internet of money”, cryptocurrencies shift the value we assign to cash to a digital form that is as fast and borderless, yet more secure than encrypted messaging. It moves throughout a trustless, decentralized network and is secured by a technology known as blockchain. Anyone can take part and help maintain a public blockchain. 

Yet cryptocurrency – and its underlying technology – is already being hijacked by governments and businesses the world over. 

Stranger than fiction? Ecoin already exists.

While extreme libertarians designed the blockchain to decentralize government and corporate power, some fear it could consolidate it instead, undermining cryptocurrency’s anti-capitalist aspirations.

“The same hype driving cryptocurrency speculation has also attracted banks, governments, and corporations—exactly the authorities it was designed to circumvent.” – Ian Bogost, The Atlantic 

Years after Mr Robot premiered its “cash is fading” monologue and postulated Ecoin, JP Morgan announced the creation of JPM Coin, its own digital currency.

As a global lender, JP Morgan moves more than $6 trillion around the world every single day, and they want to move their infrastructure to a company-managed blockchain to instantly settle payments between their clients.  Once launched, JPM Coin will be the first blockchain-based currency issued by a major U.S. bank. 

Facebook too has joined the cryptocurrency party with their infamous Libra Coin, “potentially shaping the already vast powers of the Silicon Valley giants into a borderless, unaccountable techno-oligarchy.” 

With over 2.4 billion monthly active users, Facebook could become the largest (pseudo) bank in the world. 

There are countless other crypto-inspired initiatives being researched or launched by governments – RSCoin in the UK, Venezuela’s Petro, Iran’s Central Bank, The Public Bank of China, Senegal

But cryptocurrency that lives on a permissioned ledger – a privately-run or corporately managed blockchain – centralizes control, removing its democratic, privacy-preserving nature, and therefore any hopes of social and financial empowerment for the individual. 

Money is already seized by governments and banks habitually. Pair this with an ability to continuously monitor, track and block your entire life savings, and your control is complete. This would complement China’s political and economic strategies, which are centred around state-control and anti-privacy measures – such as their social credit system

Sovereign and corporate cryptocurrencies cannot really be considered cryptocurrencies at all. They abandon the integrity of blockchain technology’s breakthrough design; its in-built trustlessness, transparency and immutability. 

With banks, governments and businesses, nothing changes – they control the chain and the currency, from its supply and distribution to its inflation rate and pegged value.

For the hacktivist that lives in all of us...

So Mr Robot got it right. 

In a world where we are being sold the illusion of economic progress, how can we claim back cryptocurrency for ourselves? 

We can start by supporting open-source projects who are building on public blockchain architecture. We can educate ourselves about the non-speculative value of cryptocurrency (and how to use and store it safely). And we can start experimenting with a range of decentralized applications that give its users control while honouring their privacy and autonomy. 

Our dVPN is a blend of all these things – and more. 

For many of us, the internet is a place to freely roam. But many online citizens are trapped behind digital walls, stopping the free flow of ideas, voices and truths. 

We are building a new online era, democratising the web itself so that it’s free and open for all. Our peer to peer network powers its own VPN while laying the foundations for the new Web 3.0. Everyday web users become nodes to protect you against censorship, surveillance and cybercrime and get paid in cryptocurrency for it. Anyone can become a node to help us fight the good fight. 

There are many exciting other projects out there also trying to make this new online world a reality. 

 

But the revolution starts with you. Will you claim back the internet? 

Join the Mysterium Army and download our free dVPN for Android.

Power of the “d” – A Comparison of Decentralized VPNs (dVPN)

Network Design

A global collection of nodes power a VPN network by sharing bandwidth P2P in exchange for cryptocurrency.

Users can easily become a node and also download the free VPN app to select from a global menu of IP addresses/bandwidth providers.

VPN users connect to bandwidth sellers (nodes) using a directory. Node providers stake tokens to advertise these services.

Users install the Orchid VPN, add OXT to their wallet, and can then access the internet through their preferred path (single or multi-hop).

P2P VPN network also functioning as an SDK. Allows anybody to become a “resource node” by selling their unutilized computing resources in the marketplace.

Users mask their Internet traffic through a series of nodes.

A global VPN service which can provide Dedicated IP address, Double VPN, Onion Over VPN and connection to the Tor anonymity network. 

As well as dedicated data centre servers around the world, centralized VPNs also allow P2P traffic on certain servers  – there are hundreds of them in different locations around the world, optimized for file sharing.

How are nodes incentivised or rewarded?

Pilot program
Monthly bounties for UK, US, Italian and German participants, earning up to $600 in ETH per year. Only an email and IP address is required.  

P2P payment network
(coming soon)
Nodes set their own price based on supply and demand. This unique micropayments system utilises cryptocurrency payments, so nodes can sell their bandwidth in small intervals, ensuring security and convenience.

Stake-weighting
Anyone can operate an Orchid Node, but must first stake (lock up as collateral) the native OXT cryptocurrency. The more OXT that is staked, the more traffic they can receive, and the greater the chances of reward in the Network.

Orchid uses an advanced payments architecture known as probabilistic nanopayments for per-packet network payments.

Resource Nodes can earn the native $SENT token in return for contributing network bandwidth and other resources by hosting a Service Node for the dVPN Service.

Nodes are not incentivized in centralized VPNs as these businesses own the infrastructure and charge end users for the service.

Node Onboarding

Anyone can run a node using their computer, mining equipment or compatible hardware such as a Raspberry Pi. Link your node to your Ethereum wallet address via an easy to use dashboard, My.Mysterium.Network to track your earnings. 

No staking is required to be a node – sign up is free.

Anyone can run a node by signing up to the stake registry and provider directory on the blockchain. 

However, all new nodes must purchase and stake OXT to start receiving traffic.

Running a node requires technical knowledge of how to install a docker and configure a node. At present there is no user-friendly dashboard or application for download.

No need to onboard. By paying for the service, users get access to the VPN service, but do not help power it.

Costs & fees

While on testnet, the VPN is currently free to use.

Once live, users will pay in cryptocurrency for only the bandwidth they consume on a pay-per-use model.

Nodes pay no fees and earn cryptocurrency directly from users of this VPN service.

Users pay for the bandwidth in OXT.

Nodes pay OXT to advertise their services.

Using their on-chain, inbuilt ‘Token Swap’ feature, users can privately purchase $SENT tokens to access any service on the Sentinel network.

Running a node is free.

Monthly subscription model, rather than a pay-as-you-go structure. Users get access to a VPN service where they can select from IP addresses based all over the world to suit their browsing needs.

VPN Security

Layered protection protocols built to protect any individual or organization. Mysterium is a fast and scalable transport security layer to reinvent privacy via VPN. Traffic is encrypted and sharded into separate pieces, filtered in an unrecognisable form through the distributed node network — without the possibility of being traced or censored.

Users can select single- or multi-hop onion routed circuits by selecting nodes randomly weighted on stake and filtered by price, location, etc. A single hop route has the benefits of a normal VPN connection, creating a tunnel to route your traffic over a public network or your ISP, while a multi-hop connection provides additional privacy benefits by securing your network data from any one provider.

Swixer is Sentinel’s first utility that allows anybody to simply convert their cryptocurrency tokens online while keeping their data away from prying eyes. 

User’s privacy is enhanced by Swixer’s cross-chain swaps between the Ethereum chain and other blockchains which possess a working zero-knowledge protocol or privacy layer within the protocol.

Traditional VPN services route all users’ internet traffic through a remote server, hiding IP addresses and encrypting all incoming and outgoing data. For encryption, they use the OpenVPN and Internet Key Exchange v2/IPsec technologies in their applications.

One company admits their servers were hacked due to an expired internal private key being exposed, potentially allowing anyone to spin out their own servers imitating their own.

Logging policy

no logs! Mysterium protocol removes any technical possibility for collecting or storing logs centrally.

No logs.

No logs.

In theory, a centralized VPN *could* keep logs, but most state they are committed to a zero-logs policy.

Node Security

Mysterium allows users to select whitelisted traffic only, designed to protect nodes. However nodes can choose to accept any kind of traffic and increase their earning potential. They’ll soon identify and block bad actors from the network through the use of registered identities and reputation system.

Users can prevent certain kinds of attacks from malicious exit nodes by using a default exit node whitelist consisting of trusted VPN partners. Users can use their own whitelists, and eventually well known third parties will emerge as whitelist curators.

Sentinel is developing a relay network, where participants in the network can choose to be a relay or an exit node on which encrypted tunnels traffic between the VPN paid user and an exit node.

It will also involve the use of governance nodes which will dictate path of packet transmission between user and exit node.

Nodes are protected as the centralized VPN assumes all security and legal risks.

Ease of Use

VPN is a simple to use and free desktop or mobile application. 

New nodes can get set up in just 5 minutes and 5 steps via a simple, user-friendly dashboard. There is a knowledgebase and support team on hand to help. 

Users will need to have some basic understanding of cryptocurrency and must have an Ethereum wallet set up to receive payments.

Learn more about upcoming features.

VPN app designed for mobile and desktop. People wishing to be nodes must register and have some prior knowledge of cryptocurrency and staking.

Sentinel is not user-friendly and is better suited to more technically proficient users or those intuitive with Ethereum DApps and blockchain platforms.

Smart algorithms automatically select the best VPN server for you based on location, loads, or your special requirements.

They also have a dedicated support team.

Scalability

As with most P2P infrastructure, the more participants which join the network, the stronger and more robust it becomes.

Mysterium’s micropayments system is a homegrown Layer 2 solution. It was built to handle large volumes of users and transactions, making the network faster and more scalable.

Orchid uses a probabilistic payment system which scales to millions of transactions per second, enabling a highly liquid bandwidth market without a trusted central party.

Sentinel’s “multi-chain architecture” secures data exchange between people and both centralized and decentralized applications meaning. This is meant to solve problems with infrastructure and scaling.

Depends on high bandwidth throughput and fast connection speeds to provide an optimal service for their users. Often use multiple tunneling protocols to ensure their network can scale and can adapt to various needs.

Social following

11.3K Twitter Followers

2000 Medium Followers

2088 Telegram Members

27.1 K Twitter Followers

235 Medium Followers

4381 Telegram Members

3,392 Twitter Followers

336 Medium Followers

2946 Telegram Members

Not applicable.

Compatible with

Android, Mac, Windows, Linux.

iOS, Android, Mac, Linux, and (soon) Windows.

Mac, Windows, Linux, Android.

Android, Windows, Mac, iOS, Chrome/Firefox extension, Linux.

Decentralised?

You bet.

Of course.

Of course.

Nope. Decentra-what?

Network status

Testnet live – 900 residential nodes, with more than 300 live at any given point.

Between five and 10 node providers at launch, including players from both the traditional VPN world and “new entrants from the crypto space.”

83 nodes in the network, with an average of 28 at any time

Choose from over 5200 servers in 59 countries.

Also – several cases of being hAcKEd

Open Source?

Transparent and collaborative from Ground Zero – check out Myst codebase.

Duh. Everything to see here.

Yep. Peek under the hood here.

No – centralized VPNs are proprietary and closed source.

Geoblocking; its impact on free speech to free movies online

We’ve all been there; “this content is unavailable in your country.” 

For many, geoblocking is an everyday inconvenience. For others, it’s a disguised form of censorship. This widely accepted practice allows companies to restrict access to their service based purely on your location. 

While this is generally for the sake of copyright and basic economics, in some extreme cases, it’s a violation of our human rights – such as the right to access information freely.

When the internet turns against you

Just imagine if the next time you went out to see a movie, you and your fellow viewers were each charged different ticket prices depending on your nationality. This is essentially what’s at play with geoblocking – location-based discrimination. And it’s happening to you every time you shop, stream or browse online. 

From Apple to small ecommerce stores, businesses the world over are varying their prices based on what they expect you to afford. Prices may even change depending on what time of day it is or the temperature outside. The digital economy has made it easy for companies to collect this data, later used to exploit your spending habits or socio-economic status. Even if you’re just a few suburbs apart, what price you pay may be vastly different to someone else in your own city. 

Last year, laws were introduced by the Council of the European Union to protect consumers from this kind of discrimination “based on customers’ nationality, place of residence or place of establishment.”

And while these anti-geoblocking regulations may be one initiative for tearing down these digital walls, there’s little to get excited about. These regulations only apply to businesses selling goods and services, but not online content more broadly. And ultimately, it’s up to the governments of its member states to enforce – so it might as well be optional. 

Yes, much of geoblocking comes down to basic economics. But the web was not designed to be segmented this way. It was designed to create a global village, where a user in Tibet had precisely the rights and opportunities as someone in Toronto. In an age where we’re supposedly more equal and connected than ever before, it’s a shame we can’t do better.

We’re still a long way from the equalized cyber utopia the internet promised us in the nineties.

Copyright, or wrong?

Some films and TV shows costs hundreds of millions to make. To their producers, these pieces of content are considered investments, which we help pay off everytime we pay to watch them. 

But digital piracy has become a huge problem worldwide, taking a huge cut out of their studio’s profits. Tens of billions of visits were made to media piracy sites worldwide in 2018 alone. If you can watch movies online for free, then why would you pay to see it in the cinema, or subscribe to a streaming service?

This unfortunate trend means the lifecycle of these films become shorter once they leave the cinema. In response, studios have begun selling their movies through on-demand streaming services like Apple’s iTunes store and Amazon Prime. These platforms can also sell ad space, milking more money out of their advertising space. 

But every market demands different content. What is a hit in some parts of the world is a flop in others. And with so much money at stake each time a film is created, studios enforce strict copyright laws to ensure they maximise the return on their investment. Each content-deal is carefully negotiated by territory. Studios charge outlets like Netflix far more to offer certain titles in some countries than others. This is why geoblocking has become such an effective method for honouring these copyright laws and agreements. 

Yet in today’s attention economy, the ultimate goal is to get as many eyes on a piece of content as possible. The more eyes, the more content can claim to be worth in ad revenue. If you geoblock something that a customer is willing to pay for with their potentially undivided attention, you may be sabotaging a potential revenue stream. This kind of thinking is surprisingly alien to those stuck in the ages of traditional television.

In fact, reports suggest that removing “unjustified geoblocking…could foster growth and increase consumer choice throughout the internal market.”

Free streaming - or freedom of speech?

Geoblocking is an inconvenience for those of us fortunate enough to access most content online. In some parts of the world, its use is far more sinister. Governments are even forcibly removing content from streaming services to aid their political agendas. 

In Turkey, for example, streaming services were previously allowed to operate outside the country’s censorship rules. But since September, every streaming service will now have to apply for a license which complies with government enforced internet regulation. The aim is to inhibit dissent, in all its digital forms. 

Content providers must now “navigate different political and moral landscapes” as calls for censorship expand worldwide. With a flick of a switch, businesses can willingly convene with oppressive regimes to prevent free access to information. Geoblocking has no longer become a method for business, but a veiled form of censorship. 

Our constant battle for free speech has become more obvious in the digital world. The open sharing of ideas built the privileged world we live in. Companies should be encouraging, not hindering, the flow of cultural and artistic exports around the world. In fact, this 2018 annual SEC report lists both censorship and “the need to adapt content… for specific cultural and language differences” as a commercial risk for these entertainment businesses.   

But more importantly, if we shelter society from alternative or diverse ways of thinking, we risk a cultural vacuum where nothing is challenged or changed. If censorship had its way, the civil rights movement would never have happened and we may still be convinced that the Sun orbits the Earth

The bird is the not the word

Geoblocking can also serve as a tool of government oppression, putting a chokehold on democracy. A prominent example is Turkey, where the government demanded that Twitter withhold hundreds of accounts affiliated with voices opposing the current regime.  

Similar injustices included blocking Twitter entirely just two weeks before the 2014 general election, and later again in the wake of a coup attempt against the Turkish president.

In his words;

“We’ll eradicate Twitter. I don’t care what the international community says. Everyone will witness the power of the Turkish Republic.”

Situations like these, in many ways, say more about the alarming power of the big media platforms such as Facebook and Twitter than anything else. They’ve become as influential as a utility company. When paired with an unscrupulous government, the internet’s potential for fostering free, diverse discourse is starting to dwindle.  

When it comes to protecting free speech and human rights, the internet has the ability to be the world’s superhero.  

But this kind of geoblocking, and censorship more generally, is very much now the kryptonite slowly killing this hope.

Help us sink the Censorship - the power of the free VPN

It’s unlikely that governments and media platforms will support an open internet. If we’re to figure out this mess, our only hope is to find our own ways of circumventing unethical geoblocking and creating an internet that we all deserve. 

The world is well aware of this too. In fact, one quarter of the world has used a VPN in the last month. Looking at the leading markets of VPN usage, Asia Pacific leads the demand. This is closely followed by countries such as Turkey and Saudi Arabia (no surprises there). Wherever there is high tech and low freedom, demand for VPNs blossom. 

In today’s world VPNs are essential for online security and privacy. But the risks that occur with your typical VPN are more apparent than ever. 

Enter the decentralized VPN. While your typical centralized VPN will merely morph your current IP address into a new one, a decentralized VPN uses layered protection protocols to hide both your identity and location from any geoblockers or prying eyes. Doing this adds an extra layer of security and privacy; previously one’s only option was for our identities to pass through a centralized VPN, having them store our information in the process. This process meant that our identities were, all too often, protected by unreliable security measures

When you use a decentralized VPN, the service is powered entirely by other web users like you. Each person can rent out their IP address and bandwidth to others in this P2P network and earn crypto in exchange. Due to its distributed infrastructure, none of your data can be physically stored anywhere, and all traffic being routed through these personal nodes is heavily encrypted. 

The more nodes that join help increase the network’s speed and efficiency. So by simply offering up your spare bandwidth, you enable fellow Mysterium users to browse freely, avoiding geoblockers and every other force that quashes a free and open internet.

 The more nodes we run, the freer and more private our online lives become. It’s that simple.

We already have 812 nodes in our network and we’re growing fast. Check out our network dashboard to see all our nodes around the world

Find out if you’re eligible to become a node get paid for your excess internet.

My.Mysterium.Network – How to get started with your new node dashboard!

Discover our new human-friendly platform for node runners.

Humans are at the core of everything we do. 

As we help create the fabric of the new Web 3.0, we understand that this decentralised web is, and always will be, powered by people. Without the contributions and support of everyday web users, we cannot bring to life an internet which everyone is entitled to – censorship and surveillance-free, open and secure. 

But in order to break the business and government-powered paradigm of the Web 2.0, we also need to make it as easy as possible for anyone – not just blockchain-literate users – to be part of this new online era. We believe that by empowering people with simple tools, we can spread decentralised infrastructure around the world and create the strong foundation the Web 3.0 needs. 

That’s why we have built a new platform for our node community, called My.Mysterium.Network (MMN).

This dashboard-style interface is designed to improve the entire node running experience.  It’s a crucial part of our updated node infrastructure. All it takes is some quick setting up and login details to get you started! 

Through this platform, you can link your node to your unique ServerID, provide your wallet details to start earning crypto, and even track your node’s performance.

Here’s how to get started with MMN.

After you’ve set up and plugged in your Raspberry Pi, open up My.Mysterium.Network in your browser. 

(If you haven’t set up your Raspberry Pi yet, head to our help.mysterium.network and follow these instructions)

 

Click on the ‘Create account’ button. 

Register your account with your name, email and password which was provided in your Welcome email.

Welcome to your home dashboard. MMN will automatically detect your node, so it should appear under ‘Nodes on your network’. Click on ‘Claim node’.

You will be prompted to agree to our Terms & Conditions. Click ‘Save this node to my account’.

Note – you can rename your node if you like 🙂

Next, go to your personal profile page by clicking on your name in the top right corner. You can update your details anytime here. To add your Ethereum wallet address, click on payments.

Enter your wallet address and click ‘Update’.

That’s it! Head back to your ‘Home’ page and select a node to view its latest sessions and track its performance, earnings and status. 

We’re always trying to make being a node as easy as possible. If you have any feedback for us on how to make MMN even better, get in touch. 

Be sure to join our Telegram or Discord channels if you’d like to chat with others in the node community, including our team!

The Splinternet is coming, and why decentralization can stitch it back together again

Where did the World Wide dream go?

The Internet was meant to be a great equaliser. An entangled mesh of online cultures, content and information, it promised to dissolve our physical and social boundaries, creating a digital democracy of which we are all citizens. 

Now the World Wide Web is breaking apart. A free and open internet is slowly disintegrating in the hands of governments and corporations. More and more countries are fencing off their own closed, national internets, for reasons that seem purely political at best and authoritarian at worst. 

As business starts to migrate online, governments are naturally trying to extend their powers into the digital realm. ISPs and web infrastructure companies are subject to the local laws where they are based, meaning there is no way for the internet to exist outside the control of self-serving lawmakers.

This ‘cyberbalkanization’ of cyberspace goes against its founding philosophy and original vision of “openness, co-operation and creativity.”

Weapons of mass control?

The power of a shared and open internet to affect real-world politics became most obvious during the Arab Spring. Twitter and Facebook played a pivotal role in restoring democratic processes and accountability. These social media platforms transformed into tools for coordinated activism and freedom of expression, pushing their uprisings into the global spotlight. In turn, governments are ripping these kinds of tools from their citizens hands. 

In May this year, Russia passed a law which gives its own government broad powers to control their citizens access to the internet. ISPs are now required to route all web traffic through nationally censored nodes under full state control. This “sovereign internet” could then be disconnected from the global web.

China has one of the most sophisticated censorship cultures in the world and have spent decades perfecting their Great Firewall. Citizens are blocked from foreign news websites and social media platforms like YouTube, Twitter and Facebook. Automated, real-time censoring has been built into the domestic web infrastructure, so that even local websites are monitored 24/7 using specifically designed programs. VPNs are banned, cutting off the only digital portal to the outside world. 

China is proactively exporting this technology to other Asian countries to create a ‘top-down’ effect and spread these arbitrary practices throughout the region. There are dozens of countries which have become unfortunate social experiments for how censorship affects society, with most of them are regressing into an Orwellian dystopia of 1984. 

In these kinds of places – where democractic practices such as protest, free speech and a free press are forbidden – the internet is the only glimpse into any alternative political and social reality. The web is home to freedom of expression, self-education and a variety of opinions which help us strengthen our autonomy and critical thinking. 

Controlling access to the internet, or carefully defining its parameters, is a strategic and incredibly effective form of oppression.  

Censorship is a tool for keeping people in the dark, until nobody remembers how to turn on the lights again. 

The dreaded 404 - Keep Out

Authoritarian regimes aside, there are a number of ‘liberal’ countries and businesses based in the west which are also territorializing the internet, rather than creating a unified, open online world. It’s just as easy to keep people out as it is to confine them within digital walls – a catalyst for division, rather than unity.

Cutting off access to users based in other countries is known as geoblocking. Web hosts can revoke or prevent access for IPs based in one country, keeping out entire populations.

Reasons for geoblocking vary, but often it boils down to laziness or money – it may be easier to flip this switch than it is to consider any legal requirements when opening up your website’s borders.

Granted, it requires a lot of effort to accommodate a global userbase; every country has different rules for the use and movement of data online. Over 30 global regions and nations already impose their own ‘data sovereignty’ regulations. Some might live in jurisdictions that have strong privacy laws. This includes the EU, who last year introduced their GDPR laws designed to protect all users based in the European region. Now, any business which has customers or users based in the EU must either comply, or put up a digital fence.

But geoblocking is ‘ineffective’. The use of VPN services has risen dramatically – almost 25 per cent of the world’s entire internet population uses one. But traditional VPNs are expensive and slow. And while you might be wondering what VPN works with Netflix, you should be more concerned with their tracking of your online activity and behaviour. (More on this below.) 

To make the internet truly IP agnostic and censorship free, we just need to do a little rewiring…

If you want something done right, do it yourself

It’s unlikely that government involvement will lead to the kind of internet that we deserve. As with any movement rooted in social, political or economical progress, people are the answer. An internet powered by and for the people is the next step of its evolution. 

Everyday internet users – just like you – can fight unethical censorship and surveillance. Decentralised technologies  are designed specifically for this purpose. Through them, we can restore the internet to its former glory, where no one owns or controls it, and users can roam freely.

A decentralised VPN (dVPN) is one of these tools helping to rebuild an internet that is safe, accessible and borderless.

With regular VPNs, you have to pay for a subscription to use the service. These services are also often slow, limited and most worryingly, they keep logs of all their users’ online activity in centralised servers. A study of 62 commercial providers showed that many VPNs leak user traffic “through a variety of means.” Many also misrepresented the physical location of their vantage points, and appear to be hosted on servers “located in countries other than those advertised to users.”

With a decentralised VPN, everyday web users power the service, turning their computers or devices into ‘nodes’. It’s impossible to store data or keep logs, as traffic is routed through these residential nodes in a heavily encrypted, unrecognisable form. 

Mysterium’s own dVPN was the world’s first. We use layered protection protocols so anyone can browse the web anonymously. Your identity and IP are always hidden so anyone can bypass unethical censorship and surveillance. We also whitelist everyone who wants to become a node or access our VPN, protecting you and the entire network from bad players. 

But what is most unique about this dVPN is that it’s powered by a global network of everyday web users. Anyone can become a ‘node’ and share their unused bandwidth whenever it suits them. Nodes can earn up to $600 worth of ETH in a year through simple plug and play devices, like the RaspberryPi and AvadoBox

Uniting the WWDW

But Mysterium is just one of the many projects pioneering decentralization. The ecosystem is made up of amazing companies, initiatives and projects all working to fix our broken, vulnerable online world. 

There are numerous dVPNs and bandwidth marketplaces now entering the fold. While we’re all somewhat different, we’re all building upon the same vision. 

All these different, decentralised platforms compliment each other, coming together to form a new internet that is as accessible and open as if it were one. Everyone will have the freedom to choose between these different ecosystems, jumping from one to another easily. 

And while we may provide the infrastructure and tools, it’s our communities which will make the decentralised web a reality. The more people running a node at home, the faster, more stable and censorship resistant the internet becomes.

So what are you waiting for – help us stitch the web back together.

The definitive guide to being a Mysterium node

If you’re new to Mysterium Network, welcome! You’ve stumbled upon a new era of the internet. 

Mysterium is one of the many projects pioneering decentralization. We’re building the world’s largest peer to peer bandwidth marketplace to power the Web 3. Together we are rewiring the internet so it’s faster, safer and more accessible for all. 

We’re here to show you how easy it is to do three things: 

  1. Earn cryptocurrency 
  2. Protect your online privacy & security 
  3. Decentralize the internet 

First up - rent your unused bandwidth and earn cryptocurrency.

If you’re reading this article, then you have an internet connection. But did you know that most of the internet you pay for goes to waste, sitting idle or completely unused? By becoming a Mysterium node you can share your spare internet bandwidth with a global community of other nodes, spreading your connection even further. 

What is a node? 

In a peer-to-peer network like Mysterium’s, a node represents a single device, such as your computer, which helps power and maintain that network. Through your node, you can voluntarily contribute your internet or computing resources, such as bandwidth or processing power. You share it directly with the entire network without any kind of official host or authority needed. That’s the beauty of blockchain.

Anyone can easily become a node by doing either of these things:

  1. Buy a Raspberry Pi device, plug it into your router and simply switch it on. Then head to My.Mysterium.Network to register your node.
  2. Download our easy to use node app designed for Mac or Windows.

More detail:

A Raspberry Pi is a small hardware device that functions as your Mysterium node. Your Ethererum wallet address is tied to it, so it’s as simple as plug, play and earn. Read all about them here.

You can join our Raspberry Pi node pilot if you’re in the US, UK, Germany and Italy and earn up to $600 worth of ETH in a year.

And the cherry (or raspberry :p) on top? We’ve just rolled out a node referral program for the UK, so you will be rewarded when you introduce new nodes to our network.

Create your referral code and reach out directly to sharmini@mysterium.network to find out how you can start onboarding nodes and educating your local community about decentralization.

We make it easy to become part of the new token economy. If you want to learn more ways to earn crypto easily, check out our post listing 14 ways to earn cryptocurrency.

Then - enjoy (and power) the world’s first decentralised, free VPN.

As we’ve already discussed, when you become a node, you join and power our network. Our node network is completely run by and for the people. You share your internet resources with a global community and are rewarded with ETH. 

But our node network can do lots of other cool things, like power its own global, free VPN! 

You can either be in node-mode to power the VPN and earn tokens, or be in VPN-mode to use it. With most VPNs, you have to pay for a subscription to use their service. With Mysterium, you get paid for being the service.

Because it’s decentralised, our VPN is far more secure, with no single point of attack or failure. We encrypt your data and use layered protection protocols built to defend both people and organizations. You can browse anonymously, with your identity and IP always hidden, avoiding unethical surveillance and cyberattacks. 

We also whitelist everyone who wants to become nodes or access our VPN network. Whitelisting is where we create a list of IP addresses that we trust to use our domains or service. It’s a security feature that allows us to limit and control access to Mysterium, protecting you and the entire network from bad players. 

And while other VPNs offer online security, in many cases they still can – and do – maintain logs. Because of our decentralized architecture, it’s impossible for us to store your data or log your traffic. Instead, all your traffic is distributed across the entire network, with no single node having the full picture of who you are or what you’re up to.

Now relax - you’re already decentralizing internet.

The best part about being a node is that technically it is YOU fighting online censorship, surveillance and cybercrime. 

For many of us, the internet is a place to freely roam. But many online citizens are trapped behind digital walls, stopping the free flow of ideas, voices and truths. 

Our founder wrote a great piece about the internet before it was hijacked by governments and selfish corporations, and what we can do to reclaim and protect it now.  

As a node, you lend others your digital freedom. You help a global community rewire the internet, safeguarding freedom of speech and anonymous expression online. 

Join the fastest growing community decentralizing and democratising the web, one node at a time. 

Sign up here or download the Web3 revolution. 

Earn free crypto by selling your unused internet and more…

Decentralizing the world economy.

The internet redefined business forever, replacing brick and mortar with computer screens. But what’s more important is that it formed entirely new economic systems, such as the sharing and gig economies.

Made up of freelancers and temporary workers, the gig economy affords people the freedoms and independence to work in their own way. We can now customise our jobs to fit into our lives, and not the other way around.

The success of sharing economy startups-turned-conglomerates signalled that these community-driven businesses had a much-needed model – one which empowered consumers for the first time.

These sub-economies show us what our global community is capable of when given an internet connection and a platform to share, collaborate and connect with one another. They break apart the traditional professional landscape and opens up new, fluid streams of income.  

Tokens - money of the fourth industrial revolution?

Token economies are the next iteration of finance. Their decentralized systems are designed by and for people, rather than purely commercial profit. For example, with traditional sharing economies, host platforms like Airbnb and Uber take their ‘share’ and turn into conglomerates.

In a decentralized sharing economy, these companies become obsolete; you are the user, the host and the network itself. Token economies can create financial opportunities for everyone, regardless of geography or level of education.

In a token economy, value can easily be digitised and shared. People are incentivised to contribute their time, resources or services through token reward systems. These transparent, secure and community-run systems are built on decentralised networks called blockchains, most commonly the Ethereum blockchain. They enable all kinds of decentralized applications (dApps) to be developed and plugged into them.

Traditional Economy

People pay businesses for goods and services. Revenue and profit flows one way – customer to business.

Sharing & Gig Economy

Businesses or individuals pay people to provide goods and services, but host companies take a cut and you play by their rules.

Token Economy

People rent, share and sell goods and services directly with each other or businesses on their own terms – no fees, no contracts, middlemen.

Here are some token economies which you can be a part of today.

Rent, don’t share

Golem Network

Golem allows the entire internet community to share their computing power through its decentralized network. It combines the power of users’ individual machines, creating one giant supercomputer. Anyone can tap into and utilise it for all sorts of power-intensive needs, such as rendering high-quality film. You receive tokens in exchange for contributing your own computing power.

Mysterium Network

Just like Golem, Mysterium has created an entire network which enables anyone to contribute their resources and receive tokens in exchange. In this case, users can buy a Rasberry Pi preloaded with a node and power the network. It’s as simple as plug, play and earn. Switch it on to start sharing your unused bandwidth (internet connection) while you work or sleep. Even better, users will be rewarded for each successful node they introduce to the network through their referral program.

Origin Protocol

Origin allows anyone to build their own decentralized marketplace. You can create and manage listings for all kinds of assets and services. Buyers and sellers use the platform to discover each other, browse listings, make bookings and even leave ratings and reviews.

Predict the future

Augur

Augur is a prediction markets platform which harnesses the power of the crowds. It allows anyone, anywhere, to create or participate in markets and bet on real-world events, such as elections or the weather forecast. For example, you can “turn your political knowledge into predictive power” by waging on the outcome of upcoming elections and other political events. You can bet on any event worldwide for no sign-up, no deposits or limits and near-zero fees. Prediction markets are not just for gambling – they create more accurate prediction tools.

Work for tokens

Earn

Earn bitcoin by replying to emails and completing tasks. You can set up a free professional profile and then join curated lists based on your skills and interests. You can receive paid messages from recruiters, startups, and researchers.

You can also get paid to learn about new projects within the cryptocurrency space, helping startups to build their communities, get feedback on whitepapers or airdrop tokens.

 

Bounty0x

Similar to Earn, Bounty0x is a crypto bounty hunting platform. You can receive cryptocurrency and tokens by completing simple marketing, software development and creative tasks. This includes content creation, graphic design, filling out surveys, translating services, programming and video animation. They currently offer six different cryptocurrencies as a form of payment, as well as ERC20 utility tokens. They will soon be adding security tokens.

 

BULVRD

Earn tokens while you drive. With BULVRD, you help build and maintain a global mapping and road reporting network. Use the app while you drive and help report road incidents like traffic and hazards. You earn on the drives you’re already making and can use their Augmented Reality experience to earn even more.

 

Bounties Network

The Bounties Network aims to change the way we collaborate, solving the core problems individuals face when working and transacting with each other across the globe.

It lets you create projects, collaborate and get paid for doing work in any domain – from freelancing to grassroots social action, research, content translation, or video production.

Use their Explorer to search through a global market of projects and talent. You can easily create or fulfill tasks, transacting in any Ethereum-based token with automated payments.

 

Open Bazaar

OpenBazaar provides everyone with the ability to buy and sell through their direct peer to peer app. You can create a store and sell whatever you’d like – your music, clothing, art. You get paid in cryptocurrency and as there are no middlemen, there are no fees and no restrictions.

Let your content work for you

Steemit

Steemit rewards its users for making and sharing content on their platform. You can monetise your content, receiving tokens based on the popularity of your posts. Users upvote or downvote what you share, incentivising a higher quality. It aims to redefine social media by building a social or ‘attention’ economy, where users receive tokens for sharing their voice, as opposed to current social media platforms where users get nothing. It has already paid out $59,595,935 worth of native STM tokens.

 

Publish0x

A “crypto powered blogging platform” with a point of difference – readers and sharers, not just writers, can also earn. This publishing platform is crypto agnostic, meaning you can accept whichever cryptocurrency you like, not just a native token. Tips are given to you by the platform. You then read articles and split your tip with authors. Ambassadors can also crypto by sharing great articles with others.

Decentralized Finance (DeFi)

Amongst the more exciting and promising use cases for blockchain is the opportunity to redefine traditional finance. Loan, borrow, trade, earn interest – all in cryptocurrency and tokens.

Compound Finance

Compound is a transparent, autonomous money market. It enables anyone to earn interest by lending their Ethereum assets to other users. You can also borrow assets, for any length of time – even as short as one blockchain block (roughly ten minutes)! There are no requirements for how long an asset must be supplied or borrowed. Interest accumulates every block, so you’re free to withdraw or repay your loan at any time.

 

MakerDAO

Maker is creating economic opportunity for everyone. It is one of the leading projects in the blockchain community and is known for pioneering transparent and sustainable finance. Its open platform allows equal access to high-quality financial services, including fair credit for everyone. They also provide a decentralized stablecoin, collateral loans, and community governance. They will help you understand everything you need to know.

 

Dharma

Once you’ve made all your tokens, you can easily grow your crypto holdings to make your money go further. Instead of letting your tokens sit in a wallet or on an exchange (you should never let it sit in an exchange, for security reasons), you can lend your crypto and earn up to 11% interest APR. Or if you want to borrow crypto, you can get some in minutes – no credit checks required. Dharma doesn’t actually touch your crypto, it just gives you the platform to loan or borrow it.

———–

Token economies are already creating a global workforce that is as diverse and varied as internet users themselves. You can easily be a part of them yourself.

Learn more about Mysterium’s node pilot where you can earn ETH for sharing your bandwidth.

Please beware of scams. We will never ask you for your private keys.

Got it!
X myStickymenu